{"title":"Zajištění informací a věcí v návrhu nového trestního řádu","authors":"Jaroslav Fenyk, Jan Provazník","doi":"10.14712/23366478.2023.28","DOIUrl":null,"url":null,"abstract":"The paper focuses on an overview of the Draft New Code of Criminal Procedure’s chapter covering searching for, discovering, and securing information, items, electronic data, and documents important for criminal procedure. It is divided into two main parts. The first is a brief introduction to the new conception in a general manner and strives to provide a comprehensive analysis of its main cornerstones and traits, the second consists of an analysis of the most important novelties in particular areas such as a new regime for securing electronic data, new rules for the search of premises where advocacy is conducted, a determination of ownership of a secured item etc. It also brings a discussion of a few chosen elements, which the authors deem as controversial or important. Where the text of the draft is criticized, possible solutions are also recommended.","PeriodicalId":52921,"journal":{"name":"Acta Universitatis Carolinae Iuridica","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2023-09-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Acta Universitatis Carolinae Iuridica","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14712/23366478.2023.28","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"Social Sciences","Score":null,"Total":0}
引用次数: 0
Abstract
The paper focuses on an overview of the Draft New Code of Criminal Procedure’s chapter covering searching for, discovering, and securing information, items, electronic data, and documents important for criminal procedure. It is divided into two main parts. The first is a brief introduction to the new conception in a general manner and strives to provide a comprehensive analysis of its main cornerstones and traits, the second consists of an analysis of the most important novelties in particular areas such as a new regime for securing electronic data, new rules for the search of premises where advocacy is conducted, a determination of ownership of a secured item etc. It also brings a discussion of a few chosen elements, which the authors deem as controversial or important. Where the text of the draft is criticized, possible solutions are also recommended.